Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal representation
biblio
About possibilities of applying logical analysis of natural language in computer science
Submitted by aekwall on Mon, 11/02/2020 - 1:30pm
formal representation
transparent intensional logic
semantic machine
programming language semantics
Natural languages
natural language Montague intensional logic
montague intensional logic
logical apparatuses
logical analysis of natural language
logical analysis
Human behavior
formal languages
expressive logical method
computer science
formal logic
Computing Theory and Compositionality
Compositionality
Human Factors
pubcrawl
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 4:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
global flow diagram
Virtual machining
unauthorized access risks
unauthorized access
security of data
pubcrawl170108
pubcrawl170107
multilevel hybrid cloud algorithm
legitimacy detection
graph theory
global flow graph
Access Control
Frequency modulation
formal representation
detection algorithms
detection algorithm
Decision Making
data access
Cloud Computing
Algorithm design and analysis
access violation